How To Prove The Join Theorem For D G 1

Size: px
Start display at page:

Download "How To Prove The Join Theorem For D G 1"

Transcription

1 The Journal of Symbolic Logic Volume 00, Number 0, XXX 0000 GENERALIZED HIGH DEGREES HAVE THE COMPLEMENTATION PROPERTY NOAM GREENBERG, ANTONIO MONTALBÁN, AND RICHARD A. SHORE Abstract. We show that if d GH 1 then D( d) has the complementation property, i.e. for all a < d there is some b < d such that a b = 0 and a b = d. 1. Introduction. A major theme in the investigation of the structure of the Turing degrees, (D, T ), has been the relationship between the order theoretic properties of a degree and its complexity of definition in arithmetic as expressed by the Turing jump operator which embodies a single step in the hierarchy of quantification. For example, there is a long history of results showing that 0 has many special order theoretic properties. To cite just a few: every countable partial order can be embedded below 0 (Kleene and Post [KP54]); there are minimal degrees below 0 (Sacks [Sac61]); 0 cups to every degree above it (and so has the cupping property)(friedberg [Fri57]); every degree below 0 joins up to 0 (and so has the join property)(robinson [Rob72], Posner and Robinson [PR81]). It was often hoped that some such property would distinguish either 0 or some class of degrees closely related to it. For degrees below 0, the notion of being close to 0 (or 0 at the other end) was also measured by the jump operator via the high/low hierarchy: for d T 0, d H n d (n) = 0 (n+1) and d L n d (n) = 0 (n). The questions then became at which levels of this hierarchy do the various properties of 0 appear. The corresponding results for the above properties for d T 0 are as follows: every countable partial order can be embedded below every d / L 2 ; there are minimal degrees below every d H 1 ; every d / L 2 cups to every degree above it; every degree below d joins up to d for d H 1. (Except for the last, these results are all known to be sharp in terms of the high/low hierarchy. The sharpness of the first follows from the existence of a minimal degree a L 2 L 1 : There is a minimal a < 0 not in L 1 by Sasso [Sas74] and it is in L 2 by Jockusch and Posner [JP78]. This minimal degree is easily seen to be weakly recursive in the sense of Ishmukhametov [Ish99] and then, by that work, has a strong minimal cover b, i.e. {0, a, b} is an initial segment of the degrees. This proves the sharpness of the third fact. The existence of such an initial segment with b also below 0 follows by Lerman s methods as outlined All the authors were partially supported by NSF Grant DMS c 0000, Association for Symbolic Logic /00/ /$

2 2 NOAM GREENBERG, ANTONIO MONTALBÁN, AND RICHARD A. SHORE in [Ler83, XII.5.8]. The sharpness of the second is by Lerman [Ler86].) The techniques used to prove all these positive results are tied up with approximation methods, rates of growth conditions and domination properties. Thus they are of independent interest for relating degree theoretic properties of functions with such conditions. In the setting of the degrees as a whole the analogous measure of the strength of a degree in terms of its jumps is the generalized high/low hierarchy: d GH n d (n) = (d 0 ) (n) and d GL n d (n) = (d 0 ) (n 1). (We take GL 0 = {0}.) All of the results mentioned above for d T 0, for example, are true for all degrees as long as we use the generalized hierarchy. (Jockusch and Posner [JP78]; (Cooper [Coo73]) for H 1 and Jockusch [Joc77] for GH 1 ; Jockusch and Posner [JP78]; Posner [Pos77].) Once again approximations, rates of growth and domination properties play prominent roles in the constructions. It was often hoped that these investigations would lead to a definition of 0 in D or of some of the classes in the appropriate hierarchy in D or D( 0 ). In fact, the jump operator has been defined in D by entirely different methods involving coding models of arithmetic and other arguments by Shore and Slaman [SS99] as have all of the high/low classes in D( 0 ) with the exception of L 1 by Nies, Shore and Slaman [NSS98]. The dream of a natural definition for any of these classes based on such order theoretic properties, however, still persists and can only be realized by investigations such as these. Moreover, the analysis of the relations between rates of growth and domination principles and the ordering of degrees remains intriguing on its own. In this paper we consider the complementation property for degrees d: for every a < d there is a b < d such that a b = d and a b = 0. The primary result here is that 0 has the complementation property. This result has a long history. R. W. Robinson [Rob72, cf. [PR81]] showed that every a L 2 has a complement in D( 0 ); Posner [Pos77], that every a H 1 has one and Epstein [Eps75], that every r.e. a has one. Finally, Posner [Pos81] showed that every a / L 2 has a complement in D( 0 ) and so 0 has the complementation property. By a further argument using relativization and an additional division into cases along with some known results, Posner also showed that every d GH 0, i.e. d 0, also has the complementation property. At the end of that paper, he posed four questions: 1. Is there a uniform proof of the complementation property for 0 (i.e. eliminate the split into cases and provide a single procedure that generates a complement for any nonrecursive a < 0 )? 2. Does every nonrecursive a < 0 have a 1-generic complement? 3. Does every nonrecursive a < 0 have a complement of minimal degree? 4. Does every d GH 1 have the complementation property? Slaman and Steel [SS89] answered questions 1 and 2 simultaneously by providing a uniform proof that every nonrecursive a < 0 has a 1-generic complement. Seetapun and Slaman circulated a sketch of a proposed affirmative answer to the third question around 1992 and that sketch has recently been extended and made into a proof by Lewis ([Lew03]). There have been several partial and related results about the fourth question. Epstein [Eps81], for example, showed

3 GENERALIZED HIGH DEGREES HAVE THE COMPLEMENTATION PROPERTY 3 that if a < h are r.e. and h H 1 then a has a complement in D( h). In this paper we supply a full affirmative answer: Theorem 1.1. Every degree d GH 1 has the complementation property, i.e. for every a < d there is a b < d such that a b = d and a b = 0. Like the original proof that 0 has the complementation property, our proof of this theorem is nonuniform. Rather than two case (a L 2 and a / L 2 ) we here have three separate cases, depending on the distance between a and d. The three cases are: 1. a GL a / GL 2, but there is some function recursive in d which is not dominated by any function recursive in a. 3. Every function recursive in d is dominated by some function recursive in a. Note that as defined these three cases are disjoint. The point is that if a GL 2 then d = (d 0 ) (a 0 ) = a and so there is a function recursive in d which dominates every function recursive in a. They are also each nonempty. For (2) just take d a. For (3) choose a 0 and d any degree above a which is hyperimmune free with respect to a such as is given by relativizing either Miller and Martin [MM68] or the standard construction of a Spector minimal degree using total recursive binary trees to a. (The point here is that the usual forcing argument, even if only attempting to force minimality, decides totality of every φ A e. Thus, if φ A e is total, A lies on a recursive binary tree T every path through which makes φ e total. So, for every n there is a level s of the tree such that φe T (σ) for every σ at level s. This guarantees that φ A e is dominated by the recursive function which, given n, finds such an s and then outputs the maximum value of φe T (σ) for σ on level s.) We should also note, however, that the proof we give for case (1) only needs d a and so would cover some pairs in cases (2) as well. The constructions of a complement for a in D( d) in each of the three cases are quite distinct. We describe the intuitions and the motivations for each now and provide the precise constructions and verifications in the following sections. Case 1: The existence of a complement for a below d in this case was already proved in his thesis by Posner [Pos77]. Like the proof that L 2 degrees have complements in D( 0 ) in Posner and Robinson [PR81] that proof was indirect (see [Ler83, IV.15]) and based on a nonuniform proof of the join theorem for GH 1 (see [Ler83, IV.9]). It was also explicitly left open even in [Ler83] if the degree providing the join could be made GL 1. This was answered by Lerman [Ler85] but again nonuniformly. We supply a uniform proof for this sharper version of the join theorem for GH 1 which we then modify to get this case of the complementation theorem. The basic idea of our proof of the join theorem for d GH 1 is, given A < T D d, to build a 1-generic set B in a construction recursive in D (so that B < T D) that codes D and to have the choices we make at each stage depend on A, so that the construction itself (and hence D) can be recovered from A B. It combines the key idea of Jockusch and Shore s [JS84] proof of the Posner-Robinson join theorem for 0 with Jockusch s [Joc77] use of the recursion theorem with degrees

4 4 NOAM GREENBERG, ANTONIO MONTALBÁN, AND RICHARD A. SHORE in GH 1. This approach is maintained for the proof of the first case of the complementation theorem, except that to ensure that A B T 0 we look for splits instead of strings forcing the jump. Since we are now looking for two strings rather than one, the coding is a little more complicated. Also, once we have found a split, we need the convergence of a functional with oracle A to let us know which string of the split we should take to diagonalize. This presents the problem that D cannot necessarily know if such a convergence will ever appear. However, by our case assumption, D can approximate whether a given functional with oracle A produces a total function (which is the only case we worry about). Thus, if we keep attacking some requirement, we will eventually believe the correct outcome and act appropriately. Case 2: In this case, a is no longer in GL 2, hence d cannot approximate questions regarding totality. However, as was noted by Jockusch and Posner [JP78] (using Martin s [Mar66] characterization of the domination properties of H 1 ), this loss is offset by a s ability to approximate bounds for searches conducted by 0 : for every function f T 0 (even a 0 ) there is a function g T a, not dominated by f. We would like to imitate a construction of complements below 0, and as in the previous case, we use the fact that d being generalized high enables us to approximate constructions which are naturally recursive in 0. However, another special aspect of 0 is that it is recursively enumerable. Dominating the modulus (computation) function for a recursively enumerable (even 2 ) set enables us to compute the set itself. In other words, there is a function d T 0 which isn t dominated by any function of lesser degree. In the standard constructions, this property is used to bound searches for facts which are r.e. in a. As this seems to be an essential element of all such constructions, we simply assume (this is the second case) that we are given a function d T d which isn t dominated by any function recursive in a, and carry out the construction (with the necessary modifications, of course). Given such a function we can adapt the uniform construction of complements below 0 of [SS89] to our second case. If such a function does not exist, we find ourselves in the third case for which a completely different approach seems to be required. Case 3: The key observation which enables us to construct complements in the third case is the following. Suppose that an A falling under the third case is given, and we manage to construct some B T D such that A B T 0 and such that D T (A B). In this case we must have D T A B; if not, then we have A B < T D T (A B), in other words, D 2 (A B) but is not 1 (A B), which implies (see [Ler83, III.5.9]) that the computation function for D (as a set which is 2 (A B)) is not dominated by any function recursive in A B, so also not by any function recursive in A. This contradicts the assumption that we are in case (3). To construct B as required, we simply construct a set B of minimal degree, satisfying the requirement D T (A B). Since we can assume that D T A (by the same argument as above), we cannot have B T A. Since B is minimal, we get A B T 0.

5 GENERALIZED HIGH DEGREES HAVE THE COMPLEMENTATION PROPERTY 5 Now there is a mysterious aspect of our construction. We construct a set B without reference to the set A, and then use the assumed domination property of A to get our result. This implies that any B so constructed is automatically a complement for every A falling under the third case. To accomplish this, we need to construct a B which will have properties which are fairly independent of the construction. We begin with a more controlled version of the construction of a minimal degree below a d GH 1 and then modify it to code in D in a way that can be recovered from B and any function g dominating a search function used in the construction. The case assumption for A will guarantee that there is such a function recursive in A. We begin with the standard method of constructing (a Spector) minimal degree by forcing with perfect trees. One constructs a sequence of recursive perfect trees, each tree succeeded by a splitting subtree or an extension (full) subtree, forcing either that B T Φ(B) or that Φ(B) is recursive, respectively (of course, if total). To prove Sacks [Sac61] result that there is a minimal degree below 0, one introduces a priority argument version of this basic construction and uses partial recursive trees to get a minimal degree below 0. The idea is to define the successor subtree as the splitting subtree, until we find an initial segment of the set we are building which does not split on our current tree, and then switch (permanently modulo action by higher priority requirements) to an extension (full) subtree. The generalization of this technique to working below an arbitrary GH 1 degree was introduced by Jockusch in [Joc77] where he proved that below every GH 1 degree there is a minimal degree. Since, in this case, we do not have the power of 0 to find whether a certain string splits on a tree or not, we keep looking for splits in hope of eventually finding one. The power of GH 1, together with the recursion theorem, allows us, as in the previous cases, to guess, eventually correctly, whether such a search will be successful. We use this guess to determine what kind of tree the successor will be. Since we may guess incorrectly for some time, we may switch back and forth between splitting and extension (full) subtrees, but only finitely many times, and so we maintain the finite injury character of the construction. In such a construction, the limit tree in a given place in the sequence of final trees is determined not only by the set B we construct and the question whether it splits or not on the previous tree, but also on the time during the construction at which we finally made the correct guess - this is because that stage determines what the stem of the tree will be. The primary difference between our construction and Jockusch s is that we eliminate this dependency by making the stem of the tree independent of the stage and dependent only on B and on the previous tree. As we shall see, this change allows us to recover the final list of trees from (B g), where g is any function dominating the search in the construction for splits when needed or a notification from our D recursive approximation to the (D 0 ) question as to whether there is a initial segment of B above which there are no splits. We will finally use the fact that A falls under the third case to see that such a g can be obtained from A.

6 6 NOAM GREENBERG, ANTONIO MONTALBÁN, AND RICHARD A. SHORE Our solution to the complementation problem for GH 1 obviously leaves several natural open questions. Can the complements be taken to be either always 1-generic or always minimal? Is there a uniform procedure for computing a complement from D and A = {e} D for 0 < T A < T D GH 1? Finally, before beginning the specific cases, we provide some general definitions. We fix a set D d and a set A a (later we may specify sets with particular properties). We construct a set B whose degree will be a s complement. The requirements we need to satisfy are: C: D is coded in B so that D T A B. Z Φ : If Φ(A) = Φ(B) is total, then it is recursive. (Here Φ varies over Turing functionals; we identify a functional, and the requirement associated with it, with its index.) We think of a Turing functional as a recursive function Φ : 2 <ω 2 <ω which is extendable continuously to a function Φ : 2 ω 2 ω. If q 2 <ω and n dom Φ(q) we sometimes write Φ(q; n) and write Φ(q; n) = Φ(q)(n). We fix an implicit recursive bijection ω ω <ω. We let, for n <ω, be the sequence associated with n. (n) 0, (n) 1,..., (n) l(n) 1 In this paper, tree means a function tree, that is a partial function T : 2 <ω 2 <ω which preserves order and nonorder and whose domain is closed under initial segments. Suppose that Φ is a functional. A Φ-split is a pair of strings q 0, q 1 such that Φ(q 0 ) Φ(q 1 ), i.e. for some n, Φ(q 0 ; n) Φ(q 1 ; n). If (q 0, q 1 ) is a Φ-split, then we let n Φ (q 0, q 1 ) be the least n witnessing this fact. A split (q 0, q 1 ) extends p if both q 0 and q 1 extend p. If there is some Φ-split extending p, we say that p Φ-splits. If p Φ-splits, then we let (qφ 0 (p), q1 Φ (p)) be the least split extending p, and let n Φ (p) = n Φ (qφ 0 (p), q1 Φ (p)). We say that a function f : ω ω dominates the function g : ω ω (and write g < f) if for all but finitely many n, g(n) < f(n). We use to denote containment whether proper or not. 2. Case One. We begin with a uniform proof of the join property (via a 1-generic) for d GH 1 that we then modify to produce a complement when A falls under Case 1. Theorem 2.1. If 0 < T A < T D GH 1 then there is a uniform procedure producing a 1-generic B such that A B T D. Proof. In addition to the coding the requirement C, we here have just those for 1-genericity: N Φ : Φ(B) or ( n)( q B n)(φ(q) ).

7 GENERALIZED HIGH DEGREES HAVE THE COMPLEMENTATION PROPERTY 7 (Here we diverge from the usage described above and assume that the Turing functionals Φ take no input). Without loss of generality (or uniformity), we may assume that A is the set of (natural number) codes for the initial segments of a set à of the same degree. The set B will be constructed as an increasing union of strings β s. However, for the sake of the applicability of the recursion theorem, we also present B as a finer union of initial segments p t t<ω. The construction is recursive in D, hence the complexity of the question t (p t has no extension q such that Φ(q) )? is (D 0 ) T D. Thus its answer can be approximated recursively in D. By the recursion theorem, we assume that we have a function G T D such that the limit lim s G(Φ, s) is the answer to the question. At stage s of the construction we proceed as follows: Let p 1 = β 1 =. We are given β s = p t for some t and we work for requirement N Φ for Φ = (s) 0. At substage k of stage s, we let p t+k = p t 0 k. We find the least r 0 > t + k such that either G(Φ, r 0 ) = yes or a q extending p t+k with Φ(q) is found after r 0 many steps (this search halts, for if there is no such q, then p t+k is a witness to lim G(Φ, r) = yes). Now if we didn t find a q as requested, we let l be the least element of A greater than k (of course A is infinite), and let β s+1 = p t+k+1 = p t 0 l 1 D(s). Otherwise, we take the least q p t+k such that Φ(q) and such that for some l, p t 0 l 1 q (the string we find can always be extended to such a string). If l A then we do nothing and move to the next substage. Otherwise, we let β s+1 = p t+k+1 =q D(s). To verify that this construction produces the desired B, we first need to show that there is no final stage s, in other words, that at every stage we eventually define β s+1 and move to the next stage. Assume the opposite holds and that s is the last stage. Thus at every substage k of s, we find the least q extending βs 0 k containing at least one additional 1 such that Φ(q) and this q extends βs 0 l 1 for some l A. Thus we can recursively enumerate infinitely such l and so an infinite subset of A. As this would compute A recursively we have the desired contradiction. To see that B is 1-generic consider any Φ. Find a stage s late enough such that the guess for N Φ is correct at stage s and (s) 0 = Φ. If G(Φ) = yes then there is an initial segment of B with no extension q such that Φ(q). If not, then we defined β s+1 such that Φ(β s+1 ). Finally to see that D T A B it is clearly enough to show that β s T A B: Given β s, we find the k such that βs 0 k 1 B. If k A then β s+1 = β s +k+2. Otherwise, we can recursively find the least q extending βs 0 k 1 such that Φ(q). In this case β s+1 = q + 1. We now turn to case 1 of the complementation theorem Construction. The situation is as in the proof of the join theorem above except that we have requirements Z Φ in place of N Φ and so our function G approximates the answer to the question

8 8 NOAM GREENBERG, ANTONIO MONTALBÁN, AND RICHARD A. SHORE t ( p t does not Φ-split )? Also, A T D so we can approximate Tot(A) recursively in D: we have a function T T D such that for all functionals Φ, lim s T (Φ, s) = total if Φ(A) is total, and lim s T (Φ, s) = nottotal otherwise. Construction of B. Let p 1 = β 1 =. At stage s, we are given β s = p t for some t and we work for requirement Z Φ for Φ = (s) 0. At substage k of stage s, we let p t+k = p t 0 k. We find the least r 0 > s+k such that either G(Φ, r 0 ) = yes or a Φ-split extending p t+k is found (the least one) after r 0 many steps (this search halts, for if there is no such split, then p t+k is a witness to lim G(Φ, r) = yes). In the latter case, we find the least r 1 > r 0 such that either T (Φ, r 1 ) = not total or Φ(A; n Φ (p t+k )) [r 1 ] (again, the search halts because no convergence witnesses lim T (Φ, r) = not total). Now if we didn t find a split, or didn t find convergence, we let l be the least element of A greater than k (of course A is infinite), and let β s+1 = p t+k+1 = p t 0 l 1 D(s). Otherwise, we know which element of the split q is the one which gives the wrong answer about Φ(A; n Φ (p t+k )); we may assume it extends some p t 0 l 1 for some l k. If l A then we do nothing and move to the next substage. Otherwise, we let β s+1 = p t+k+1 = q D(s), where q is the least string q and extending p t 0 l 1 such that Φ(q ) Φ(A) Verifications. We first need to show that there is no final stage s, in other words, that at every stage we eventually define β s+1 and move to the next stage. Assume the opposite holds and that s is the last stage. Thus at every substage k of s, the least Φ-split (qk 0, q1 k ) extending β s 0 k is found, and we know that at least one of qk 0, q1 k extends β s 0 l 1 for some l A. Thus, we can recursively enumerate infinitely many pairs (i k, j k ) (where both coordinates get larger and larger; i k, j k k) such that at least one of i k, j k is in A. Now we can compute A and get a contradiction. Recall that the elements of A are codes for initial segments of Ã. Let σ k be the string coded by i k and τ k the string coded by j k. Now there are two cases. Suppose that for all σ à there is some k such that σ σ k, τ k. Then we can compute à by enumerating {σ k τ k : k < ω}. Otherwise, there is some σ à and some k such that for all k > k, σ is extended by exactly one of σ k, τ k, and this one has to be an initial segment of Ã. In this case we can compute à by enumerating {σ k : k > k, σ σ k } {τ k : k > k, σ τ k }. Lemma 2.2. A B T 0. Proof. Fix Φ such that Φ(A) is total. Find a stage s late enough such that the guesses for T (Φ) and G(Φ) are correct at stage s and (s) 0 = Φ. If G(Φ) = yes

9 GENERALIZED HIGH DEGREES HAVE THE COMPLEMENTATION PROPERTY 9 then Φ(B), if total, is recursive. If not, then we must have diagonalized at stage s, so that Φ(A) Φ(B). Lemma 2.3. β s T A B. Proof. Given β s, we find the k such that βs 0 k 1 B. If k A then β s+1 = β s + k + 2. Otherwise, from A we can find the q such that β s+1 = q D(s). Corollary 2.4. D T A B. 3. Case Two. The construction takes place on a tree T ; B will be a branch on this tree. In Slaman and Steel s construction, a requirement Z Φ strives to find a Φ-split on T, and tries to let B extend that part of the split which gives the wrong answer about Φ(A). Since about Tot(A) we know naught, the strategy is to find such a split and then prevent weaker requirements from extending B beyond this split, until Z Φ makes up its mind (due to a convergence of Φ(A)) or decides to give up. In the original construction, the requirement gives up at the next stage it receives attention, at which it is either guaranteed a string which doesn t split on T (a negative win), or it is presented with a new split unto which its fortunes are now entrusted. It is the domination property of d which is used to show that each requirement cannot be foiled for ever. The first difficulty we come across is that in the construction of the tree, we wish to find out whether a certain node can be extended by some split. Instead of asking 0, we construct the tree (ignoring the coding requirement for a while) recursively in A by looking, at level s, for splits, for g(s) many steps, where g T A is a function not dominated by some fixed f 0 which bounds the search needed to find all splits which exist. Thus in many levels devoted to some Z Φ, the requirement falsely believes that no splits exist (and thus that it needs no action to succeed); but the domination properties of g ensure that, if there are infinitely many splits, splits will be found infinitely often, giving the requirement ample breathing space to act. These changes create two new difficulties. As described earlier, a requirement Z Φ imposes its will on weaker requirements (which threaten to extend B beyond a split, while Z Φ is still waiting for convergence of Φ(A)). This restraint is built into the construction of the tree, and is only imposed (for each split) for a single stage only, since at the next stage Z Φ looks ahead to find either a new split or no splits, in which case it is satisfied anyway. In our case, Z Φ does not know how long it needs to wait, thus restraints need to be made explicit. Fairness is maintained by observing that at the true stages (those stages at which g > f, meaning that the answers for the question is there a split? are correct) all unnecessary restraints are dropped. However, each requirement needs to determine for itself whether to pursue positive satisfaction (by waiting for the next split) or to give up and let B extend a node beyond which no splits are found yet, hoping that indeed no splits will appear later. It turns out that D is sufficiently strong to enable Z Φ to guess

10 10 NOAM GREENBERG, ANTONIO MONTALBÁN, AND RICHARD A. SHORE which course to take (using the recursion theorem, of course). This solves this second problem. We now give the details of the construction. For simplicity, we adopt a modular approach and ignore the coding requirement C for now, and later describe how to modify the construction to satisfy this requirement Construction of the Tree. We first define the function f which bounds the search for splits. Let f 0 (s) = max{ q 0 Φ(p), q 1 Φ(p) : p 2 s, Φ s and p Φ-splits}. Next, define f by recursion: f(0) = f 0 (0); f(s + 1) = f 0 (f(s) + 1). Finally, let f(s) = f( s, s ). Observe that f is recursive in 0. To level k of the tree we attach requirement Z Φ = (k) 0. k is called a Φ-level. We find some g T A, not dominated by f. We use g to define our tree T. T ( ) =. If T (σ) is defined and equals p, and σ is a Φ-level, then we look for a Φ-split extending p which appears before stage g(s). If one is found, then we define T (σ i) = q i Φ (p). Otherwise, we let T (σ 0) = p 0 and leave T (σ 1) undefined. We say that a string p is a node if it is in range T. We let L(k) = {T (σ) : σ = k}, and also write level(p) = k for all p L(k). It is easily verified that T is 1 (A) (so not only is T partial recursive in A but also dom T is recursive in A). We are also interested in verifying how closely this tree reflects the truth (about existence of splits). Lemma 3.1. For all k and p L(k), p < f(k). Proof. This is true by induction; the inductive step holds because the elements of the k + 1 st level are least splits (or immediate successors) of strings of level k, and f bounds all such splits. Definition. A level k is called Φ-true if it is a Φ-level, and g(k) > f(k). Thus if k is a Φ-true level then for all p L(k), if there is no Φ-split on T extending p then indeed there is no such split at all. Lemma 3.2. For every Φ there are infinitely many Φ-true levels. Proof. We know that there are infinitely many n Φ such that g(n) f(n). For each such n, if we let k = Φ, n, then g(k) = g( Φ, n ) g(n) f( n, n ) f( Φ, n ) = f(k).

11 GENERALIZED HIGH DEGREES HAVE THE COMPLEMENTATION PROPERTY The Construction. We now describe the construction of a set B < T D such that A B T 0. We construct B as the union of an increasing sequence of initial segments β s which are on T. At stage s, each requirement Z Φ may impose a restraint r(φ)[s]. This is a level k of the tree (beyond the level of β s ), and the aim of the restraint is to prevent weaker requirements from extending β s+1 beyond the k th level of T. If a stronger requirement Z Ψ extends β s+1 beyond the k th level of T then we say that it injures Z Φ. We let R(Φ)[s] = min ({r(ψ)[s] : Ψ < Φ and r(ψ)[s] } {s}). This is the restraint imposed on requirement Z Φ at stage s. Thus at s, Z Φ is prohibited from defining β s+1 beyond the R(Φ) th level of T. There are various states in which a requirement Z Φ may find itself at a Φ-stage s. It may be positively satisfied at s if we have already forced that Φ(B) Φ(A), i.e. for some n we have Φ(A; n) = Φ(B; n) [s]. If Z Φ is positively satisfied at some stage then it is satisfied until the end of time and doesn t need to act ever again. We wish to describe when Z Φ is satisfied negatively. As explained above, this requirement will feel satisfied if it can make B extend some node p which doesn t Φ-split. Now without the power of 0, this kind of satisfaction may be temporary, for the requirement may place its bets on some such p only to discover later some Φ-split extending p. To make its decision whether to believe some negative satisfaction (or keep searching for splits), at various stages Z Φ will put some strings on a testing list l Φ (which can be thought of as a partial function defined by Z Φ during the construction). This will be the list of strings that Z Φ will test, to see if they may provide negative satisfaction. We thus say that Z Φ is negatively satisfied at s if no Φ-splits extending the last element put on l Φ are found in g(s) many steps. [We note, that if Z Φ is negatively satisfied at a true stage s, then this satisfaction is correct and permanent; at true stages we find all possible splits above nodes on levels s on the tree.] Now to decide whether it should even attempt to believe that negative satisfaction could come from some node p, Z Φ will try to find an answer to the question Is there some node p which is put on l Φ and doesn t split? This question can be answered by (D 0 ) T D. So, by the recursion theorem and the limit lemma, there is a function G T D, that we can use during the construction, which approximates the answer (i.e. lim s G(Φ, s) = yes if the answer to the question is yes, and lim s G(Φ, s) = no otherwise.) Let L(k, p) = {T (σ) : σ = k and T(σ) p},

12 12 NOAM GREENBERG, ANTONIO MONTALBÁN, AND RICHARD A. SHORE this is the collection of nodes of the k th level of T which extend p. At stage s, let L(k, s) = L(k, β s ). We say that p = T (σ) splits on T if both T (σ 0) and T (σ 1) are defined, i.e. if a relevant split exists and was discovered by step g( σ ) and put on T. Construction of B, with oracle D. At stage 0, we let β 1 =, we set the lists l Φ to be empty, and let r(φ) be undefined for all Φ. If Φ is initialized (at any stage), then r(φ) is removed. Stage s: Suppose that s is a Φ-stage. If Z Φ believes it is satisfied (positively or negatively), then we skip this stage; r(φ) is not defined. Otherwise, Z Φ may attempt to act, starting ambitiously. Positive action. If Z Φ can legally extend β s to be permanently satisfied, it does so. Namely, if there is some p on T, extending β s, on a level below R(Φ)[s], such that for some n we have Φ(p; n) Φ(A; n)[d(s)] then Z Φ lets β s+1 = p. r(φ) is removed (as the requirement is satisfied). [d is the function recursive in D, not dominated by any function recursive in A.] Negative attempts. Otherwise, we look for some p of level beneath R(Φ)[s] (but which extends β s ) which is not yet on l Φ and which is not yet seen to Φ-split. If such a p exists, we add the first one to l Φ. We now perform a test to see if we believe p can be a witness for negative success: we find the least t > s such that either G(Φ, t) = yes, or some Φ-split extending p is found by stage t. This search has to halt since if there is no split to be found, then p is a witness to the limit of G(Φ, t) being yes. If a Φ-split was found then we may try with a new node p (until we run out). Otherwise, Z Φ sets β s+1 = p, and removes r(φ). If we run out of p s without acting, the requirement does nothing at this stage, but we calculate Restraint. If r(φ) is not defined, then it is set to be level(β s ). Otherwise, if there is some Φ-level k such that r(φ) < k R(Φ)[s] and such that every p L(k, s) splits on T, then we update r(φ) to be the maximal such k. If there is no such k, then r(φ) is left unaltered. Whenever Z Φ acts and extends β s, it initializes all weaker requirements Verifications. Since this is an oracle construction, we have B T D. We first check that the construction is fair. Lemma 3.3. Every requirement is initialized only finitely many times, and eventually stops acting itself. Proof. Since initialization occurs only by action of a stronger requirement, we assume by induction that after ŝ, no requirement stronger than Z Φ acts again and so Z Φ is never initialized again. If at any time Z Φ acts positively, then its satisfaction is permanent and it will never act again. We now consider what happens to Z Φ after stage ŝ. Infinite negative action is also impossible. For either lim G(Φ, s) = no, in which case after some stage we will never believe some string is a likely candidate for negative satisfaction; or lim G(Φ, s) = yes, by virtue of a witness p which was put on l Φ ; when we put p on the list, we performed the test and acted for p (because

13 GENERALIZED HIGH DEGREES HAVE THE COMPLEMENTATION PROPERTY 13 it really doesn t split); and negative satisfaction is permanent from then on (no splits are ever discovered, and no new strings are put on the list). We digress to prove that the requirements succeed if they act. Lemma 3.4. If Z Φ ever acts positively, then it is met. Proof. Because then Φ(A) Φ(B). Lemma 3.5. If Z Φ is eventually permanently satisfied negatively by some p then it is met. Proof. We have some p B such that no Φ-splits extend p. Then Φ(B), if total, is recursive. Now if a requirement is not eventually satisfied as in the last two lemmas, then there is a last stage at which the requirement acts, necessarily a negative action. Since this does not lead to permanent satisfaction, at some later stage the last action taken is discovered to be insufficient (a split is discovered, extending the last element of l Φ ); after that stage, since the requirement never acts again, it also never believes it is satisfied. In this case we say that Z is eventually unsatisfied. We let s (Φ) be the least Φ-stage after which neither Z Φ nor any stronger requirement ever acts again, and after which Z Φ is either permanently satisfied or eventually unsatisfied. A requirement may also disturb weaker requirements by imposing restraint, so to check fairness, we need to verify that this restraint is not too prohibitive. If a requirement is permanently satisfied (positively or negatively) then it stops imposing any restraint. Otherwise we have Lemma 3.6. Suppose that Z Φ is not eventually satisfied. Then at s (Φ), r(φ) is defined; thereafter it is never removed and cannot decrease. For all s s (Φ), level(β s ) r(φ)[s]. Proof. The first part is because Z Φ is never initialized again, or acts again. The second follows because weaker requirements respect r(φ). We need to examine what happens to the restraint if a certain requirement is eventually unsatisfied. For this we use the true levels. Lemma 3.7. Suppose that Z Φ is eventually unsatisfied, k > s (Φ) is a Φ-true level and that s > k is a Φ-stage such that level(β s ) k R(Φ)[s]. Then at s, r(φ) is increased to at least k. Proof. If not, then we must have some p L(k, s) which does not split on T. But k is a true stage; thus p doesn t split, and Z Φ would act negatively at stage s. We get Lemma 3.8. lim s R(Φ)[s] =. Proof. Assume (by induction) that lim R(Φ)[s] =. Suppose, for contradiction, that lim r(φ, s) = r is finite. We can choose some Φ-true level k > r

14 14 NOAM GREENBERG, ANTONIO MONTALBÁN, AND RICHARD A. SHORE and wait for a later Φ-stage s > s (Φ) such that R(Φ)[s] > k. level(β s ) r < k; then we must have r(φ)[s] k, contradiction. Lemma 3.9. lim s β s =. Proof. There are infinitely many Φ such that, for all X, Φ(X) =, so there are no Φ-splits. For all these Φ, Z Φ will act negatively the first time it receives attention. Therefore, β s is extended infinitely often. All that is left is to verify that Z Φ is met, even if it is eventually unsatisfied. Lemma If Z Φ is eventually unsatisfied, then Φ(A) is not total. Proof. Suppose otherwise, and let h(n) be the stage at which Φ(A; n) ; h T A. We show that h dominates d for a contradiction. Let s 1, s 2,... be the stages, after s (Φ), when r(φ)[s] is increased. Let r i = r(φ)[s i ], and let p i be the element of the ri th level of T which is an initial segment of B. Since p i L(r i, s i ) (β si B), by the instructions of the construction, we must have that p i splits on T. We let n i be the splitting point, i.e. n i = n Φ (p i ). We claim that for all i < ω, h(n i ) d(n i+1 ). At stage s i+1, Z Φ did not act positively. However, the Φ-split of p i was still available for Z Φ to pick for positive satisfaction; the restraint until s i+1 was r i and r i R(Φ, s i ) R(Φ, s i+1 ) (the latter inequality holds because after s i no requirement stronger than Z Φ acts). This implies that Φ(A; n i ) [d(s i+1 )], in other words, d(s i+1 ) < h(n i ). Of course, n i < s i so d(n i+1 ) < d(s i+1 ) < h(n i ). Both h and d are increasing functions, so the last inequality implies that h dominates d: for every n > n 1, there exits i such that n i < n n i+1. Then d(n) d(n i+1 ) < h(n i ) h(n) Coding D into B. In this section we show how to modify the construction to satisfy the coding requirement C; this will ensure that indeed B is a complement for A below D. To do this, we specify an infinite, recursive set of levels on f (say all k such that (k) 0 = 0) which will be devoted to C (by the padding lemma this does not disturb the previous construction). Let n i i<ω be an increasing enumeration of this set. We define a tree T D T (as functions) by removing all nodes extending T (σ (1 D(i))) for σ 2 ni. Namely, T D = T {σ : n i < dom σ : σ(n i ) = D(i)}. Lemma T D T D and for every X [T D ], D T X A. Proof. To find whether i D, A can find (on T ) the unique σ on level n i + 1 such that T (σ) X. Since X [T D ] we have σ(n i ) = D(i). Thus all we need to do is repeat the previous construction, using T D instead of T. This can be done because the construction is recursive in D; the construction follows through verbatim. 4. Case Three.

15 GENERALIZED HIGH DEGREES HAVE THE COMPLEMENTATION PROPERTY A minimal degree below D. We first give our version of the construction of a minimal degree below D. As in Sacks s and Jockusch s constructions, we will construct a sequence of partial recursive trees T k and an increasing sequence of strings β s whose union B is a path on all of the trees. Later we will show how to modify this construction so that D can be recovered from T k. Now we just build B such that T k T (A B). We follow Lerman s [Ler83] definitions of splitting subtrees. If T is a tree and Φ is a functional, then a Φ-splitting subtree of T is a subtree S such that for all p dom T, T (p 0) and T (p 1), if defined, are a Φ-split. The canonical splitting subtree above a node T (p) (denoted S = Sp(T, Φ, p)) is defined by induction, letting the stem be T (p); given S(q) on T, S(q 0), S(q 1) is defined to be the least Φ-split on T extending S(q), and undefined if none is found. We say that X [T ] Φ-splits on T if for all σ X, there is a Φ-split on T extending σ. The requirement to be satisfied is M Φ : If BΦ-splits on every tree T k then it lies on a Φ-splitting tree. Associating requirements with numbers as usual, the strategy to satisfy k = M Φ is to let T k+1 = T k if B does not Φ-split on T k, and Sp(T k, Φ, p) for some p otherwise. We make p depend on B directly, by letting p be the shortest string such that B Sp(T k, Φ, p). As usual, the construction will have approximations T k [s] to T k and an increasing sequence β s of strings whose union is B. During each stage of the construction the trees T k [s] are enumerated a certain number of steps to find splits above β s. We will make sure that once T k has stabilized, if B splits on T k then at every s there is a split found on T k extending β s. Thus from the construction we can calculate a function f which bounds the search needed to find splits on the trees. Namely, we have a function f T D such that for all k = M Φ, if B Φ-splits on T k then for almost all n, a Φ-split extending B n will be found on T k after enumerating the tree for f(n) many steps. [We note that it is not necessary to assume that dom β s s to get such a function; to calculate f(n) we can simply wait for a stage at which dom β s > n. This will be helpful in the full construction we give at the end]. First, we would like to ensure that the above conditions on the construction indeed produce the desired result. Suppose, then, that B, T k and f are given as described. Lemma 4.1. B has minimal Turing degree. Proof. See [Ler83, V.2.6] Suppose that g is a function which dominates f. Lemma 4.2. T k T (B g). Proof. Take k = M Φ. Suppose we have already determined what T k is. First, we wish to find out what kind of tree T k+1 is, which is the same as finding whether B Φ-splits on T k or not. We first ask (B g) if there is some n such that after running T k for g(n) many steps, no Φ-splits above B n on T k are found. If not, B splits on T k.

16 16 NOAM GREENBERG, ANTONIO MONTALBÁN, AND RICHARD A. SHORE If there is such an n, then a search (recursive in B g) can find the least one n 0. We now ask 0 (which is below (B g) ) if there are any Φ-splits extending B n 0 on T k. If not, then B does not split on T k. If such a split exists, we repeat the process, asking if there is some n 1 > n 0 such that after g(n 1 ) many steps no Φ-split extending B n 1 is found on T, and if one exists, we find it and ask 0, etc. This process must stop. For if B doesn t split on T k then eventually we find some n such that there are no Φ-splits on T k extending B n (and of course none before g(n).) If B does split on T K, then the properties of f ensure that eventually, a Φ split extending B n is always found before step f(n), hence g(n). Now if B doesn t Φ-split on T k then T k+1 = T k. Otherwise, we need to find the least q such that B [Sp(T k, Φ, q)]; We then know that T k+1 = Sp(T k, Φ, q). Suppose that T k (q) B. Consider the following process: Let T = Sp(T k, Φ, q). T ( ) = T k (q) B. Since every initial segment of B splits on T k, both T (0) and T (1) are defined. We find them. If neither are initial segments of B, then the process halts. Otherwise, pick the one (say T (0)) such that T (0) B. By the same reasoning, both T (01) and T (11) are defined, etc. We see that this process is recursive in B. Thus B can tell us whether it eventually terminates or not. However, a quick inspection shows that the process terminates iff B / [T ]. Thus {r : B [Sp(T k, Φ, q)]} is recursive in B (B g). We can thus inductively (on q such that T k (q) B) ask whether q is an element of the above set (this search is recursive in B B T B ). Eventually we will find the least one which is the desired q. Now recall that we had a set A, falling under the third case, which excludes the second case. This means that for every function f recursive in D, there is some g recursive in A which dominates f. Thus we can go back and write A in each place we wrote g to get T k T (A B) Construction I. The construction which yields the B, T k and f with the desired properties is not difficult, and in fact differs only slightly from Jockusch s construction. We describe it now. We construct a sequence β s. By the recursion theorem, we have a function G(T, Φ, s) T D such that for all (partial recursive function) trees T and Turing functionals Φ, lim s G(T, Φ, s) is the answer to the question Is there some t such that β t is on T, and above β t there are no Φ-splits on T? At stage 0, we let k(0) = 0, T 0 [0] = id, β 0 = and f(0) = 0. At stage s + 1, we are given a sequence of trees T 0 [s],..., T k(s) [s] (each T k+1 [s] is either equal to T k [s] or is a splitting subtree of T k [s]), and β s which is on every T k [s]. Using G we can define a function H, which tells us how far a requirement has to search until its guess (about whether B splits or not) has evidence in reality. Namely, if k = M Φ, then H(k, s) is defined to be the least stage t > s such that either G(T k [s], Φ, t) = yes, or a Φ-split extending β s is found on

17 GENERALIZED HIGH DEGREES HAVE THE COMPLEMENTATION PROPERTY 17 T k [s]. By the properties of G, we know that such a t must exist. We also let F (k, s) = split if a Φ-split above β s is found on T k [s] at stage H(k, s); otherwise we let F (k, s) = no split. Thus F gives us k s guess about whether B Φ-splits on T k [s]. There is a discrepancy between reality and k s belief if F (k, s) = split and T k+1 [s] = T k [s], or if F (k, s) = no split but T k+1 [s] is a splitting subtree of T k [s]. If there is such a discrepancy, then it must be fixed by k by changing the tree T k+1 according to belief. We thus say that k requires attention at s if there is a discrepancy between k s beliefs and reality. If there is some k requiring attention, we act as follows: If F (k, s) = no split, we let T k+1 [s + 1] = T k [s]. If F (k, s) = split, we want to define T k+1 [s + 1] to be Sp(T k [s], Φ, q) for some q p = T k [s] 1 (β s ); as discussed above, we pick q to be the least such that β s is extended by some string on Sp(T k [s], Φ, q). How do we effectively find this q? This is similar to the process in the proof of lemma 4.2: we inductively check q =, q = p 1, q = p 2,.... We know there is a split extending β s ; thus we can search for the least split on the tree T k [s] extending T k [s](q). If neither of the two strings of the split are compatible with β s, this was the wrong q, and we try the next one. If one is, we repeat the process for that part of the split which is an initial segment of β s. We halt with a yes answer (for the q checked) if we get to a string extending β s. In either case we let k(s + 1) = k + 1 and T l [s + 1] = T l [s] for l k. If no requirement asks for attention, we let k(s+1) = k(s)+1, T l [s+1] = T l [s] for l k(s) and T k(s)+1 [s + 1] = T k(s) [s]. Now either β s is not on T k(s+1) [s + 1], but properly extended by some string which is on this tree; or β s is on T k(s+1) [s + 1] and not terminal on it. Thus we can properly extend β s to some β s+1 on that tree. That s the end of stage s. We verify that the objects constructed indeed have the desired properties. We first show that the sequence of trees stabilizes. Lemma 4.3. For all k there is a stage s (k) such that for all t s (k), k(t) > k. By the construction, we have that for all t > s (k), T k [t] = T k [s (k)]; we let T k be this final tree. Proof. s (0) = 1. Assume s (k) exists, we will show that s (k+1) exists too. Suppose that k = M Φ. Suppose that after t > s (k), G(T k, Φ, s) has stabilized on the correct answer. Then we can let s (k + 1) = t, because neither k, nor any stronger requirement, will seek attention after t. Corollary 4.4. Each M Φ succeeds. Proof. The guesses are eventually correct. Thus if B splits on T k, then T k+1 is some splitting subtree of B; if B doesn t split on T k then we re done anyway.

18 18 NOAM GREENBERG, ANTONIO MONTALBÁN, AND RICHARD A. SHORE Also as a corollary, we have that if B splits on T k then eventually, at every s, a split above β s on T k is found at stage s of the construction; this allows us to calculate the function f as required. Finally, Lemma 4.5. Assume that k = M Φ and that B splits on T k. Then T k+1 = Sp(T k, Φ, q) where q is the least string such that B [Sp(T k, Φ, q)]. Proof. Say T k+1 = Sp(T k, Φ, q), and was finally defined at stage s. Of course B [T k+1 ]. If r q then at stage s we verified that β s went off Sp(T k, Φ, r) (no string on that tree extends β s ), thus B / [Sp(T k, Φ, r)] Coding D. We now add more subtrees to our sequence T k so that we will be able to recover D from T k. We have new requirements C n, whose aim is to code the answer to n D? into the sequence of trees. We organize all C n and M Φ requirements effectively and identify each requirement with its place on the list. For C n, we use two different kinds of narrow subtrees. Definition. For p 2 <ω, let nar p, row p : 2 <ω 2 <ω be defined as follows nar p (σ) = p 00σ(0)00σ(1)00σ(2)... 00σ( σ 1) row p (σ) = p 11σ(0)11σ(1)11σ(2)... 11σ( σ 1). Now, suppose that T is a tree and that p dom T. We let Nar(T, p) = T nar p and Row(T, p) = T row p. It is easy to see that if T is partial recursive, then so are Nar(T, p) and Row(T, p), and an index for each can be obtained uniformly from p and an index for T. Lemma 4.6. Suppose that T is a tree, and that p, q dom T. Then [Nar(T, p)] [Row(T, q)] = 0. This property motivates us to satisfy k = C n by letting T k+1 = Nar(T k, p) for some p if n D and T k+1 = Row(T k, p) for some p otherwise. As we did for the splitting subtrees, to be able to recover T k+1 from T k and (A B) we eliminate the element of chance in the game by ensuring that T k+1 = Nar(T k, p) for the least p such that B [Nar(T k, p)] (or Row, as D decides). Lemma 4.7. Suppose that T is partial recursive and X [T ]. Then is recursive in X (similarly for Row). {p dom T : X [Nar(T, p)]} Proof. From X we can determine the h 2 ω such that X T [p h] (if T (p) X then X knows that p is not in the set). Then we simply ask if for such h and all n 0 mod 3, h(n) = 0 (1 for Row). So indeed if we code as promised, then B can find T k+1 from T k by inductively asking, for longer and longer p, such that T k (p) B, whether B [Nar(T k, p)]

19 GENERALIZED HIGH DEGREES HAVE THE COMPLEMENTATION PROPERTY 19 or B Row(T k, p). The first yes answer we get is the correct one (and also tells us whether n D). It would seem that all we need to do now is add this last element to the construction, namely if at stage s, k = k(s) = C n and no stronger requirement asks for attention, then we should define T k+1 [s] to be Nar(T k [s], p) (or Row(T k [s], p) if n / D) for the shortest p such that β s is extended by some string on Nar(T k [s], p). However, this is not so easy, for the reason that β s may be nonterminal on T k [s] for some k < k(s), but terminal on the narrow subtree T k+1 [s]; for p = T 1 k (β s), T k (p 0) may be defined but T k [s](p 00) or T k [s](p 000) may be undefined. In this case we would not be able to extend β s and would be stuck. We note, however, that the reason that T k [s](p 00) or T k [s](p 000) are undefined, is that some split was not found on an earlier tree T l [s]. The strategy to extricate ourselves from this situation is to try and extend β s on T l [s] until we find the necessary split or guess that such a split does not exist. In the former case we can go on with the construction; in the latter we change our guess about T l+1 and remove later trees Construction II. We first describe the idea of the construction. The new construction attempts to follow in the footsteps of the previous construction; requirements k = M Φ define subtrees T k+1 which are splitting subtrees or not, and amend the trees according to their guesses. New requirements k = C n will define T k+1 to be some narrow subtree of T k, the type of which will be determined by whether n D or not. All goes well as long as our initial segment β = β s is nonterminal on the trees. Suppose, however, that β is terminal on T k[s] [s], even after the action of M requirements. We then look at the greatest l k(s) such that T l [s] is a splitting subtree of T l 1 [s]. We note that β must be nonterminal on T l [s]; otherwise, l 1 would have redefined T l to be equal to T l 1. Let p = T 1 l β. The reason that β is terminal on T k(s) is that for some q, T l (p q) is undefined; the latter is undefined because sufficiently many splits above β have not been discovered on T l 1. If some extension γ of β on T l 1 really doesn t split on T l 1, then we would like to extend β to γ and redefine T l = T l 1 ; this would resolve the issue. Otherwise, we will find more and more splits until β will be discovered to not be terminal on T k(s) after all. The question is how to tell whether there is such γ. After all, our guessing function G only answers questions about initial segments of B, not arbitrary nodes on the tree. The solution is to gradually extend β, at substages of the stage s. As β is not terminal on T l, we can extend it for one step on T l. Now we search for splits on T l 1 as usual; if we believe there are none T l 1 can act and set T l = T l 1. Otherwise, a split is found which means we can extend β one step further on T l. The process continues until β is nonterminal on T k(s), or a node γ as described is found and set as an initial segment of B. We note a notational decision. It could be the case that at the beginning of the stage, some k [l, k(s)) redefines T k+1 = T k because β is terminal on T k. Also, it could be the case that at some some substage we believe that β can no longer be extended on T l 1 (and redefine T l = T l 1 ); no previous tree is acting, which means that the problem which was just described has just reappeared, for a smaller pair (l, k(s)). The above actions will have to be repeated, but

20 20 NOAM GREENBERG, ANTONIO MONTALBÁN, AND RICHARD A. SHORE we do this at the next stage s + 1 (we can move on because β is on all trees, even if terminal on some; between substages we will not change the trees, as the indexing would become cumbersome.) We now give the full construction. At stage s we are given a sequence of trees T k [s] k k(s) and a string β t on all of those trees. The guessing function G(T, Φ, s) is defined as before; it approximates the answer to the same question: Is there some t such that β t is on T and there is no Φ-split extending β t on T? The elements of the construction are as follows: Guessing Splitting. We define guessing functions H and F. At stage s, at a substage at which we have β r as an initial segment of B, and for k = M Φ, H(k, s, r) is defined to be the least stage u > r+s such that either G(T k [s], Φ, u) = yes, or a Φ-split extending β r is found on T k [s] after running the tree for u many steps. F (k, s, r) is defined analogously; it is split in the former outcome and no split in the latter. Discrepancy between belief and reality is defined as in the previous construction; at the particular stage and substage, k feels the discrepancy if F (k, s, r) = split but T k+1 [s] = T k [s], or if F (k, s, r) = no split but T k+1 [s + 1] is a splitting subtree of T k [s]. At any stage and substage, if there is some requirement k = M Φ < k(s) asking for attention, then the strongest such requirement receives it and redefines T k+1 according to its belief F. As before, it lets T k+1 [s + 1] = T k [s] if F (k, s, t) = no split, and T k+1 [s + 1] = Sp(T k [s], Φ, p) for the shortest p such that β r is extended by some string on the latter tree. It lets k(s + 1) = k + 1 and leaves the trees T l for l k unchanged. If β r is not on T k+1 [s + 1] then it is extended by some string on that tree; we let β r+1 be such a string. Otherwise, we hand β r to the next stage. Action of the last tree. At some substage of stage s, we may instruct the last requirement k(s) to act (this may happen if no other requirement asks for attention and if β r is not terminal on T k(s) [s]). k(s) first extends β r to some string β r+1 on T k(s) [s]. Then, If k(s) = M Φ, it lets T k+1 [s + 1] = T k [s]. If k(s) = C n and n D, then k(s) lets T k+1 [s + 1] = Nar(T k [s], p) for p the shortest substring of T k [s] 1 (β r+1 ) such that β r+1 is extended by some node on Nar(T k [s], p). If necessary, β r+1 is extended again to β r+2 so that it actually lies on the new tree. If k(s) = C n and n / D, we act as in the previous case, but with Row replacing Nar. In both cases, we let k(s + 1) = k(s) + 1, and leave the trees T l for l k(s) unchanged. Construction. The instructions at stage s are as follows. If some M requirement asks for attention, we let the strongest one act and end the stage. If no

THE SEARCH FOR NATURAL DEFINABILITY IN THE TURING DEGREES

THE SEARCH FOR NATURAL DEFINABILITY IN THE TURING DEGREES THE SEARCH FOR NATURAL DEFINABILITY IN THE TURING DEGREES ANDREW E.M. LEWIS 1. Introduction This will be a course on the Turing degrees. We shall assume very little background knowledge: familiarity with

More information

Degrees that are not degrees of categoricity

Degrees that are not degrees of categoricity Degrees that are not degrees of categoricity Bernard A. Anderson Department of Mathematics and Physical Sciences Gordon State College banderson@gordonstate.edu www.gordonstate.edu/faculty/banderson Barbara

More information

THE DEGREES OF BI-HYPERHYPERIMMUNE SETS

THE DEGREES OF BI-HYPERHYPERIMMUNE SETS THE DEGREES OF BI-HYPERHYPERIMMUNE SETS URI ANDREWS, PETER GERDES, AND JOSEPH S. MILLER Abstract. We study the degrees of bi-hyperhyperimmune (bi-hhi) sets. Our main result characterizes these degrees

More information

Low upper bound of ideals, coding into rich Π 0 1 classes

Low upper bound of ideals, coding into rich Π 0 1 classes Low upper bound of ideals, coding into rich Π 0 1 classes Antonín Kučera the main part is a joint project with T. Slaman Charles University, Prague September 2007, Chicago The main result There is a low

More information

CLASSES, STRONG MINIMAL COVERS AND HYPERIMMUNE-FREE DEGREES

CLASSES, STRONG MINIMAL COVERS AND HYPERIMMUNE-FREE DEGREES Π 0 1 CLASSES, STRONG MINIMAL COVERS AND HYPERIMMUNE-FREE DEGREES ANDREW E.M. LEWIS Abstract. We investigate issues surrounding an old question of Yates as to the existence of a minimal degree with no

More information

Any set with a (unique) η-representation is Σ 3, and any set with a strong η-representation is

Any set with a (unique) η-representation is Σ 3, and any set with a strong η-representation is η-representation OF SETS AND DEGREES KENNETH HARRIS Abstract. We show that a set has an η-representation in a linear order if and only if it is the range of a 0 -computable limitwise monotonic function.

More information

Embeddability and Decidability in the Turing Degrees

Embeddability and Decidability in the Turing Degrees ASL Summer Meeting Logic Colloquium 06. Embeddability and Decidability in the Turing Degrees Antonio Montalbán. University of Chicago Nijmegen, Netherlands, 27 July- 2 Aug. of 2006 1 Jump upper semilattice

More information

JOINING UP TO THE GENERALIZED HIGH DEGREES

JOINING UP TO THE GENERALIZED HIGH DEGREES PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 138, Number 8, August 2010, Pages 2949 2960 S 0002-9939(10)10299-8 Article electronically published on March 29, 2010 JOINING UP TO THE GENERALIZED

More information

A single minimal complement for the c.e. degrees

A single minimal complement for the c.e. degrees A single minimal complement for the c.e. degrees Andrew Lewis Leeds University, April 2002 Abstract We show that there exists a single minimal (Turing) degree b < 0 s.t. for all c.e. degrees 0 < a < 0,

More information

There is no degree invariant half-jump

There is no degree invariant half-jump There is no degree invariant half-jump Rod Downey Mathematics Department Victoria University of Wellington P O Box 600 Wellington New Zealand Richard A. Shore Mathematics Department Cornell University

More information

Turing Degrees and Definability of the Jump. Theodore A. Slaman. University of California, Berkeley. CJuly, 2005

Turing Degrees and Definability of the Jump. Theodore A. Slaman. University of California, Berkeley. CJuly, 2005 Turing Degrees and Definability of the Jump Theodore A. Slaman University of California, Berkeley CJuly, 2005 Outline Lecture 1 Forcing in arithmetic Coding and decoding theorems Automorphisms of countable

More information

A NOTE ON INITIAL SEGMENTS OF THE ENUMERATION DEGREES

A NOTE ON INITIAL SEGMENTS OF THE ENUMERATION DEGREES A NOTE ON INITIAL SEGMENTS OF THE ENUMERATION DEGREES THEODORE A. SLAMAN AND ANDREA SORBI Abstract. We show that no nontrivial principal ideal of the enumeration degrees is linearly ordered: In fact, below

More information

COFINAL MAXIMAL CHAINS IN THE TURING DEGREES

COFINAL MAXIMAL CHAINS IN THE TURING DEGREES COFINA MAXIMA CHAINS IN THE TURING DEGREES WEI WANG, IUZHEN WU, AND IANG YU Abstract. Assuming ZF C, we prove that CH holds if and only if there exists a cofinal maximal chain of order type ω 1 in the

More information

EMBEDDING COUNTABLE PARTIAL ORDERINGS IN THE DEGREES

EMBEDDING COUNTABLE PARTIAL ORDERINGS IN THE DEGREES EMBEDDING COUNTABLE PARTIAL ORDERINGS IN THE ENUMERATION DEGREES AND THE ω-enumeration DEGREES MARIYA I. SOSKOVA AND IVAN N. SOSKOV 1. Introduction One of the most basic measures of the complexity of a

More information

An example of a computable

An example of a computable An example of a computable absolutely normal number Verónica Becher Santiago Figueira Abstract The first example of an absolutely normal number was given by Sierpinski in 96, twenty years before the concept

More information

Biinterpretability up to double jump in the degrees

Biinterpretability up to double jump in the degrees Biinterpretability up to double jump in the degrees below 0 0 Richard A. Shore Department of Mathematics Cornell University Ithaca NY 14853 July 29, 2013 Abstract We prove that, for every z 0 0 with z

More information

THE TURING DEGREES AND THEIR LACK OF LINEAR ORDER

THE TURING DEGREES AND THEIR LACK OF LINEAR ORDER THE TURING DEGREES AND THEIR LACK OF LINEAR ORDER JASPER DEANTONIO Abstract. This paper is a study of the Turing Degrees, which are levels of incomputability naturally arising from sets of natural numbers.

More information

CODING TRUE ARITHMETIC IN THE MEDVEDEV AND MUCHNIK DEGREES

CODING TRUE ARITHMETIC IN THE MEDVEDEV AND MUCHNIK DEGREES CODING TRUE ARITHMETIC IN THE MEDVEDEV AND MUCHNIK DEGREES PAUL SHAFER Abstract. We prove that the first-order theory of the Medvedev degrees, the first-order theory of the Muchnik degrees, and the third-order

More information

DEGREES OF CATEGORICITY AND THE HYPERARITHMETIC HIERARCHY

DEGREES OF CATEGORICITY AND THE HYPERARITHMETIC HIERARCHY DEGREES OF CATEGORICITY AND THE HYPERARITHMETIC HIERARCHY BARBARA F. CSIMA, JOHANNA N. Y. FRANKLIN, AND RICHARD A. SHORE Abstract. We study arithmetic and hyperarithmetic degrees of categoricity. We extend

More information

GENERIC COMPUTABILITY, TURING DEGREES, AND ASYMPTOTIC DENSITY

GENERIC COMPUTABILITY, TURING DEGREES, AND ASYMPTOTIC DENSITY GENERIC COMPUTABILITY, TURING DEGREES, AND ASYMPTOTIC DENSITY CARL G. JOCKUSCH, JR. AND PAUL E. SCHUPP Abstract. Generic decidability has been extensively studied in group theory, and we now study it in

More information

Global Properties of the Turing Degrees and the Turing Jump

Global Properties of the Turing Degrees and the Turing Jump Global Properties of the Turing Degrees and the Turing Jump Theodore A. Slaman Department of Mathematics University of California, Berkeley Berkeley, CA 94720-3840, USA slaman@math.berkeley.edu Abstract

More information

1 if 1 x 0 1 if 0 x 1

1 if 1 x 0 1 if 0 x 1 Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or

More information

CHAPTER 7 GENERAL PROOF SYSTEMS

CHAPTER 7 GENERAL PROOF SYSTEMS CHAPTER 7 GENERAL PROOF SYSTEMS 1 Introduction Proof systems are built to prove statements. They can be thought as an inference machine with special statements, called provable statements, or sometimes

More information

CS 3719 (Theory of Computation and Algorithms) Lecture 4

CS 3719 (Theory of Computation and Algorithms) Lecture 4 CS 3719 (Theory of Computation and Algorithms) Lecture 4 Antonina Kolokolova January 18, 2012 1 Undecidable languages 1.1 Church-Turing thesis Let s recap how it all started. In 1990, Hilbert stated a

More information

Lecture notes on the Turing degrees, AII Graduate Summer School in Logic Singapore, 28 June - 23 July 2010

Lecture notes on the Turing degrees, AII Graduate Summer School in Logic Singapore, 28 June - 23 July 2010 Lecture notes on the Turing degrees, AII Graduate Summer School in Logic Singapore, 28 June - 23 July 2010 Richard A. Shore 1 Department of Mathematics Cornell University Ithaca NY 14853 January 3, 2012

More information

THE NON-ISOLATING DEGREES ARE UPWARDS DENSE IN THE COMPUTABLY ENUMERABLE DEGREES

THE NON-ISOLATING DEGREES ARE UPWARDS DENSE IN THE COMPUTABLY ENUMERABLE DEGREES THE NON-ISOLATING DEGREES ARE UPWARDS DENSE IN THE COMPUTABLY ENUMERABLE DEGREES S. BARRY COOPER, MATTHEW C. SALTS, AND GUOHUA WU ABSTRACT. The existence of isolated degrees was proved by Cooper and Yi

More information

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory

More information

WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT?

WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT? WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT? introduction Many students seem to have trouble with the notion of a mathematical proof. People that come to a course like Math 216, who certainly

More information

CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e.

CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e. CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e. This chapter contains the beginnings of the most important, and probably the most subtle, notion in mathematical analysis, i.e.,

More information

Reading 13 : Finite State Automata and Regular Expressions

Reading 13 : Finite State Automata and Regular Expressions CS/Math 24: Introduction to Discrete Mathematics Fall 25 Reading 3 : Finite State Automata and Regular Expressions Instructors: Beck Hasti, Gautam Prakriya In this reading we study a mathematical model

More information

INTRODUCTORY SET THEORY

INTRODUCTORY SET THEORY M.Sc. program in mathematics INTRODUCTORY SET THEORY Katalin Károlyi Department of Applied Analysis, Eötvös Loránd University H-1088 Budapest, Múzeum krt. 6-8. CONTENTS 1. SETS Set, equal sets, subset,

More information

Diagonalization. Ahto Buldas. Lecture 3 of Complexity Theory October 8, 2009. Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach.

Diagonalization. Ahto Buldas. Lecture 3 of Complexity Theory October 8, 2009. Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach. Diagonalization Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach. Ahto Buldas Ahto.Buldas@ut.ee Background One basic goal in complexity theory is to separate interesting complexity

More information

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS ASHER M. KACH, KAREN LANGE, AND REED SOLOMON Abstract. We construct two computable presentations of computable torsion-free abelian groups, one of isomorphism

More information

Graphs without proper subgraphs of minimum degree 3 and short cycles

Graphs without proper subgraphs of minimum degree 3 and short cycles Graphs without proper subgraphs of minimum degree 3 and short cycles Lothar Narins, Alexey Pokrovskiy, Tibor Szabó Department of Mathematics, Freie Universität, Berlin, Germany. August 22, 2014 Abstract

More information

The Settling Time Reducibility Ordering and 0 2 Setting

The Settling Time Reducibility Ordering and 0 2 Setting THE SETTLING TIME REDUCIBILITY ORDERING AND 0 2 SETS BARBARA F. CSIMA Abstract. The Settling Time reducibility ordering gives an ordering on computably enumerable sets based on their enumerations. The

More information

The Classes P and NP

The Classes P and NP The Classes P and NP We now shift gears slightly and restrict our attention to the examination of two families of problems which are very important to computer scientists. These families constitute the

More information

Total Degrees and Nonsplitting Properties of Σ 0 2 Enumeration Degrees

Total Degrees and Nonsplitting Properties of Σ 0 2 Enumeration Degrees Total Degrees and Nonsplitting Properties of Σ 0 2 Enumeration Degrees M. M. Arslanov, S. B. Cooper, I. Sh. Kalimullin and M. I. Soskova Kazan State University, Russia University of Leeds, U.K. This paper

More information

Totally < ω ω -computably enumerable degrees and m-topped degrees

Totally < ω ω -computably enumerable degrees and m-topped degrees Totally < ω ω -computably enumerable degrees and m-topped degrees Rod Downey and Noam Greenberg School of Mathematics, Statistics, and Computer Science Victoria University PO Box 600 Wellington New Zealand

More information

MOP 2007 Black Group Integer Polynomials Yufei Zhao. Integer Polynomials. June 29, 2007 Yufei Zhao yufeiz@mit.edu

MOP 2007 Black Group Integer Polynomials Yufei Zhao. Integer Polynomials. June 29, 2007 Yufei Zhao yufeiz@mit.edu Integer Polynomials June 9, 007 Yufei Zhao yufeiz@mit.edu We will use Z[x] to denote the ring of polynomials with integer coefficients. We begin by summarizing some of the common approaches used in dealing

More information

Chapter 7. Sealed-bid Auctions

Chapter 7. Sealed-bid Auctions Chapter 7 Sealed-bid Auctions An auction is a procedure used for selling and buying items by offering them up for bid. Auctions are often used to sell objects that have a variable price (for example oil)

More information

Mathematical Induction

Mathematical Induction Mathematical Induction In logic, we often want to prove that every member of an infinite set has some feature. E.g., we would like to show: N 1 : is a number 1 : has the feature Φ ( x)(n 1 x! 1 x) How

More information

Stochastic Inventory Control

Stochastic Inventory Control Chapter 3 Stochastic Inventory Control 1 In this chapter, we consider in much greater details certain dynamic inventory control problems of the type already encountered in section 1.3. In addition to the

More information

A BASIS THEOREM FOR Π 0 1 CLASSES OF POSITIVE MEASURE AND JUMP INVERSION FOR RANDOM REALS ROD DOWNEY AND JOSEPH S. MILLER

A BASIS THEOREM FOR Π 0 1 CLASSES OF POSITIVE MEASURE AND JUMP INVERSION FOR RANDOM REALS ROD DOWNEY AND JOSEPH S. MILLER A BASIS THEOREM FOR Π 0 1 CLASSES OF POSITIVE MEASURE AND JUMP INVERSION FOR RANDOM REALS ROD DOWNEY AND JOSEPH S. MILLER Abstract. We extend the Shoenfield jump inversion theorem to the members of any

More information

Lecture 2: Universality

Lecture 2: Universality CS 710: Complexity Theory 1/21/2010 Lecture 2: Universality Instructor: Dieter van Melkebeek Scribe: Tyson Williams In this lecture, we introduce the notion of a universal machine, develop efficient universal

More information

Linear Risk Management and Optimal Selection of a Limited Number

Linear Risk Management and Optimal Selection of a Limited Number How to build a probability-free casino Adam Chalcraft CCR La Jolla dachalc@ccrwest.org Chris Freiling Cal State San Bernardino cfreilin@csusb.edu Randall Dougherty CCR La Jolla rdough@ccrwest.org Jason

More information

PROCESS AND TRUTH-TABLE CHARACTERISATIONS OF RANDOMNESS

PROCESS AND TRUTH-TABLE CHARACTERISATIONS OF RANDOMNESS PROCESS AND TRUTH-TABLE CHARACTERISATIONS OF RANDOMNESS ADAM R. DAY Abstract. This paper uses quick process machines to provide characterisations of computable randomness, Schnorr randomness and weak randomness.

More information

TOPOLOGY: THE JOURNEY INTO SEPARATION AXIOMS

TOPOLOGY: THE JOURNEY INTO SEPARATION AXIOMS TOPOLOGY: THE JOURNEY INTO SEPARATION AXIOMS VIPUL NAIK Abstract. In this journey, we are going to explore the so called separation axioms in greater detail. We shall try to understand how these axioms

More information

Metric Spaces. Chapter 1

Metric Spaces. Chapter 1 Chapter 1 Metric Spaces Many of the arguments you have seen in several variable calculus are almost identical to the corresponding arguments in one variable calculus, especially arguments concerning convergence

More information

TAKE-AWAY GAMES. ALLEN J. SCHWENK California Institute of Technology, Pasadena, California INTRODUCTION

TAKE-AWAY GAMES. ALLEN J. SCHWENK California Institute of Technology, Pasadena, California INTRODUCTION TAKE-AWAY GAMES ALLEN J. SCHWENK California Institute of Technology, Pasadena, California L INTRODUCTION Several games of Tf take-away?f have become popular. The purpose of this paper is to determine the

More information

MA651 Topology. Lecture 6. Separation Axioms.

MA651 Topology. Lecture 6. Separation Axioms. MA651 Topology. Lecture 6. Separation Axioms. This text is based on the following books: Fundamental concepts of topology by Peter O Neil Elements of Mathematics: General Topology by Nicolas Bourbaki Counterexamples

More information

Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm.

Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm. Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm. We begin by defining the ring of polynomials with coefficients in a ring R. After some preliminary results, we specialize

More information

About the inverse football pool problem for 9 games 1

About the inverse football pool problem for 9 games 1 Seventh International Workshop on Optimal Codes and Related Topics September 6-1, 013, Albena, Bulgaria pp. 15-133 About the inverse football pool problem for 9 games 1 Emil Kolev Tsonka Baicheva Institute

More information

1. Prove that the empty set is a subset of every set.

1. Prove that the empty set is a subset of every set. 1. Prove that the empty set is a subset of every set. Basic Topology Written by Men-Gen Tsai email: b89902089@ntu.edu.tw Proof: For any element x of the empty set, x is also an element of every set since

More information

6.3 Conditional Probability and Independence

6.3 Conditional Probability and Independence 222 CHAPTER 6. PROBABILITY 6.3 Conditional Probability and Independence Conditional Probability Two cubical dice each have a triangle painted on one side, a circle painted on two sides and a square painted

More information

FIRST ORDER THEORY OF THE s-degrees AND ARITHMETIC

FIRST ORDER THEORY OF THE s-degrees AND ARITHMETIC FIRST ORDER THEORY OF THE s-degrees AND ARITHMETIC DANIELE MARSIBILIO AND ANDREA SORBI Abstract. We show that the first order theories of the s-degrees, and of the Q-degrees, are computably isomorphic

More information

Computability Theory

Computability Theory CSC 438F/2404F Notes (S. Cook and T. Pitassi) Fall, 2014 Computability Theory This section is partly inspired by the material in A Course in Mathematical Logic by Bell and Machover, Chap 6, sections 1-10.

More information

each college c i C has a capacity q i - the maximum number of students it will admit

each college c i C has a capacity q i - the maximum number of students it will admit n colleges in a set C, m applicants in a set A, where m is much larger than n. each college c i C has a capacity q i - the maximum number of students it will admit each college c i has a strict order i

More information

Worksheet for Teaching Module Probability (Lesson 1)

Worksheet for Teaching Module Probability (Lesson 1) Worksheet for Teaching Module Probability (Lesson 1) Topic: Basic Concepts and Definitions Equipment needed for each student 1 computer with internet connection Introduction In the regular lectures in

More information

This asserts two sets are equal iff they have the same elements, that is, a set is determined by its elements.

This asserts two sets are equal iff they have the same elements, that is, a set is determined by its elements. 3. Axioms of Set theory Before presenting the axioms of set theory, we first make a few basic comments about the relevant first order logic. We will give a somewhat more detailed discussion later, but

More information

INCIDENCE-BETWEENNESS GEOMETRY

INCIDENCE-BETWEENNESS GEOMETRY INCIDENCE-BETWEENNESS GEOMETRY MATH 410, CSUSM. SPRING 2008. PROFESSOR AITKEN This document covers the geometry that can be developed with just the axioms related to incidence and betweenness. The full

More information

6.852: Distributed Algorithms Fall, 2009. Class 2

6.852: Distributed Algorithms Fall, 2009. Class 2 .8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election

More information

This chapter is all about cardinality of sets. At first this looks like a

This chapter is all about cardinality of sets. At first this looks like a CHAPTER Cardinality of Sets This chapter is all about cardinality of sets At first this looks like a very simple concept To find the cardinality of a set, just count its elements If A = { a, b, c, d },

More information

Introduction to Automata Theory. Reading: Chapter 1

Introduction to Automata Theory. Reading: Chapter 1 Introduction to Automata Theory Reading: Chapter 1 1 What is Automata Theory? Study of abstract computing devices, or machines Automaton = an abstract computing device Note: A device need not even be a

More information

Basic Concepts of Point Set Topology Notes for OU course Math 4853 Spring 2011

Basic Concepts of Point Set Topology Notes for OU course Math 4853 Spring 2011 Basic Concepts of Point Set Topology Notes for OU course Math 4853 Spring 2011 A. Miller 1. Introduction. The definitions of metric space and topological space were developed in the early 1900 s, largely

More information

Fairness in Routing and Load Balancing

Fairness in Routing and Load Balancing Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria

More information

1 Construction of CCA-secure encryption

1 Construction of CCA-secure encryption CSCI 5440: Cryptography Lecture 5 The Chinese University of Hong Kong 10 October 2012 1 Construction of -secure encryption We now show how the MAC can be applied to obtain a -secure encryption scheme.

More information

SOLUTIONS TO ASSIGNMENT 1 MATH 576

SOLUTIONS TO ASSIGNMENT 1 MATH 576 SOLUTIONS TO ASSIGNMENT 1 MATH 576 SOLUTIONS BY OLIVIER MARTIN 13 #5. Let T be the topology generated by A on X. We want to show T = J B J where B is the set of all topologies J on X with A J. This amounts

More information

Mathematics for Computer Science/Software Engineering. Notes for the course MSM1F3 Dr. R. A. Wilson

Mathematics for Computer Science/Software Engineering. Notes for the course MSM1F3 Dr. R. A. Wilson Mathematics for Computer Science/Software Engineering Notes for the course MSM1F3 Dr. R. A. Wilson October 1996 Chapter 1 Logic Lecture no. 1. We introduce the concept of a proposition, which is a statement

More information

Simulation-Based Security with Inexhaustible Interactive Turing Machines

Simulation-Based Security with Inexhaustible Interactive Turing Machines Simulation-Based Security with Inexhaustible Interactive Turing Machines Ralf Küsters Institut für Informatik Christian-Albrechts-Universität zu Kiel 24098 Kiel, Germany kuesters@ti.informatik.uni-kiel.de

More information

o-minimality and Uniformity in n 1 Graphs

o-minimality and Uniformity in n 1 Graphs o-minimality and Uniformity in n 1 Graphs Reid Dale July 10, 2013 Contents 1 Introduction 2 2 Languages and Structures 2 3 Definability and Tame Geometry 4 4 Applications to n 1 Graphs 6 5 Further Directions

More information

Chapter 6: Episode discovery process

Chapter 6: Episode discovery process Chapter 6: Episode discovery process Algorithmic Methods of Data Mining, Fall 2005, Chapter 6: Episode discovery process 1 6. Episode discovery process The knowledge discovery process KDD process of analyzing

More information

Pascal is here expressing a kind of skepticism about the ability of human reason to deliver an answer to this question.

Pascal is here expressing a kind of skepticism about the ability of human reason to deliver an answer to this question. Pascal s wager So far we have discussed a number of arguments for or against the existence of God. In the reading for today, Pascal asks not Does God exist? but Should we believe in God? What is distinctive

More information

ON INITIAL SEGMENT COMPLEXITY AND DEGREES OF RANDOMNESS

ON INITIAL SEGMENT COMPLEXITY AND DEGREES OF RANDOMNESS ON INITIAL SEGMENT COMPLEXITY AND DEGREES OF RANDOMNESS JOSEPH S. MILLER AND LIANG YU Abstract. One approach to understanding the fine structure of initial segment complexity was introduced by Downey,

More information

Mathematical Induction. Lecture 10-11

Mathematical Induction. Lecture 10-11 Mathematical Induction Lecture 10-11 Menu Mathematical Induction Strong Induction Recursive Definitions Structural Induction Climbing an Infinite Ladder Suppose we have an infinite ladder: 1. We can reach

More information

2.3. Proposition. There exists an enumeration operator W a such that χ A = W a (A ) for all A N.

2.3. Proposition. There exists an enumeration operator W a such that χ A = W a (A ) for all A N. THE ω-enumeration DEGREES IVAN N. SOSKOV Abstract. In the present paper we initiate the study of the partial ordering of the ω-enumeration degrees. This ordering is a semi-lattice which extends the semi-lattice

More information

The Ergodic Theorem and randomness

The Ergodic Theorem and randomness The Ergodic Theorem and randomness Peter Gács Department of Computer Science Boston University March 19, 2008 Peter Gács (Boston University) Ergodic theorem March 19, 2008 1 / 27 Introduction Introduction

More information

Quotient Rings and Field Extensions

Quotient Rings and Field Extensions Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.

More information

Introduction to computer science

Introduction to computer science Introduction to computer science Michael A. Nielsen University of Queensland Goals: 1. Introduce the notion of the computational complexity of a problem, and define the major computational complexity classes.

More information

arxiv:1112.0829v1 [math.pr] 5 Dec 2011

arxiv:1112.0829v1 [math.pr] 5 Dec 2011 How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly

More information

1 Approximating Set Cover

1 Approximating Set Cover CS 05: Algorithms (Grad) Feb 2-24, 2005 Approximating Set Cover. Definition An Instance (X, F ) of the set-covering problem consists of a finite set X and a family F of subset of X, such that every elemennt

More information

Regular Languages and Finite Automata

Regular Languages and Finite Automata Regular Languages and Finite Automata 1 Introduction Hing Leung Department of Computer Science New Mexico State University Sep 16, 2010 In 1943, McCulloch and Pitts [4] published a pioneering work on a

More information

Formal Languages and Automata Theory - Regular Expressions and Finite Automata -

Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March

More information

How To Solve The Stable Roommates Problem

How To Solve The Stable Roommates Problem THE ROOMMATES PROBLEM DISCUSSED NATHAN SCHULZ Abstract. The stable roommates problem as originally posed by Gale and Shapley [1] in 1962 involves a single set of even cardinality 2n, each member of which

More information

FIBRATION SEQUENCES AND PULLBACK SQUARES. Contents. 2. Connectivity and fiber sequences. 3

FIBRATION SEQUENCES AND PULLBACK SQUARES. Contents. 2. Connectivity and fiber sequences. 3 FIRTION SEQUENES ND PULLK SQURES RY MLKIEWIH bstract. We lay out some foundational facts about fibration sequences and pullback squares of topological spaces. We pay careful attention to connectivity ranges

More information

GROUPS ACTING ON A SET

GROUPS ACTING ON A SET GROUPS ACTING ON A SET MATH 435 SPRING 2012 NOTES FROM FEBRUARY 27TH, 2012 1. Left group actions Definition 1.1. Suppose that G is a group and S is a set. A left (group) action of G on S is a rule for

More information

CSE 135: Introduction to Theory of Computation Decidability and Recognizability

CSE 135: Introduction to Theory of Computation Decidability and Recognizability CSE 135: Introduction to Theory of Computation Decidability and Recognizability Sungjin Im University of California, Merced 04-28, 30-2014 High-Level Descriptions of Computation Instead of giving a Turing

More information

(IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems.

(IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems. 3130CIT: Theory of Computation Turing machines and undecidability (IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems. An undecidable problem

More information

NP-Completeness and Cook s Theorem

NP-Completeness and Cook s Theorem NP-Completeness and Cook s Theorem Lecture notes for COM3412 Logic and Computation 15th January 2002 1 NP decision problems The decision problem D L for a formal language L Σ is the computational task:

More information

3. Mathematical Induction

3. Mathematical Induction 3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)

More information

A simple criterion on degree sequences of graphs

A simple criterion on degree sequences of graphs Discrete Applied Mathematics 156 (2008) 3513 3517 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam Note A simple criterion on degree

More information

136 CHAPTER 4. INDUCTION, GRAPHS AND TREES

136 CHAPTER 4. INDUCTION, GRAPHS AND TREES 136 TER 4. INDUCTION, GRHS ND TREES 4.3 Graphs In this chapter we introduce a fundamental structural idea of discrete mathematics, that of a graph. Many situations in the applications of discrete mathematics

More information

2.3 Convex Constrained Optimization Problems

2.3 Convex Constrained Optimization Problems 42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions

More information

WRITING PROOFS. Christopher Heil Georgia Institute of Technology

WRITING PROOFS. Christopher Heil Georgia Institute of Technology WRITING PROOFS Christopher Heil Georgia Institute of Technology A theorem is just a statement of fact A proof of the theorem is a logical explanation of why the theorem is true Many theorems have this

More information

11 Ideals. 11.1 Revisiting Z

11 Ideals. 11.1 Revisiting Z 11 Ideals The presentation here is somewhat different than the text. In particular, the sections do not match up. We have seen issues with the failure of unique factorization already, e.g., Z[ 5] = O Q(

More information

ON FUNCTIONAL SYMBOL-FREE LOGIC PROGRAMS

ON FUNCTIONAL SYMBOL-FREE LOGIC PROGRAMS PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Mathematical Sciences 2012 1 p. 43 48 ON FUNCTIONAL SYMBOL-FREE LOGIC PROGRAMS I nf or m at i cs L. A. HAYKAZYAN * Chair of Programming and Information

More information

Full and Complete Binary Trees

Full and Complete Binary Trees Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full

More information

Tiers, Preference Similarity, and the Limits on Stable Partners

Tiers, Preference Similarity, and the Limits on Stable Partners Tiers, Preference Similarity, and the Limits on Stable Partners KANDORI, Michihiro, KOJIMA, Fuhito, and YASUDA, Yosuke February 7, 2010 Preliminary and incomplete. Do not circulate. Abstract We consider

More information

The Halting Problem is Undecidable

The Halting Problem is Undecidable 185 Corollary G = { M, w w L(M) } is not Turing-recognizable. Proof. = ERR, where ERR is the easy to decide language: ERR = { x { 0, 1 }* x does not have a prefix that is a valid code for a Turing machine

More information

CONTRIBUTIONS TO ZERO SUM PROBLEMS

CONTRIBUTIONS TO ZERO SUM PROBLEMS CONTRIBUTIONS TO ZERO SUM PROBLEMS S. D. ADHIKARI, Y. G. CHEN, J. B. FRIEDLANDER, S. V. KONYAGIN AND F. PAPPALARDI Abstract. A prototype of zero sum theorems, the well known theorem of Erdős, Ginzburg

More information

Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads

Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads CS 7880 Graduate Cryptography October 15, 2015 Lecture 10: CPA Encryption, MACs, Hash Functions Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Chosen plaintext attack model of security MACs

More information